1,977Results for "cybersecurity strategy"
-
Cybersecurity Foundations: Governance, Risk, and Compliance (GRC)1h 56m
Cybersecurity Foundations: Governance, Risk, and Compliance (GRC)
By: AJ Yawn
Course
-
Strategy and roadmap6m
Strategy and roadmap
From: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep
Video
-
The importance of strategy49s
The importance of strategy
From: Software Testing Foundations: Test Strategy
Video
-
Build a cybersecurity strategy5m
Build a cybersecurity strategy
From: Leadership in Cybersecurity Oversight
Video
-
DevSecOps Metrics and Continuous Improvement1h 40m
DevSecOps Metrics and Continuous Improvement
By: Tim Chase
Course
-
Cybersecurity strategy in action5m
Cybersecurity strategy in action
From: Leadership in Cybersecurity Oversight
Video
-
SABSA strategy and planning5m
SABSA strategy and planning
From: Enterprise Security Architecture: Aligning Cybersecurity with Business Goals
Video
-
Complete Guide to Cybersecurity: A Practical Approach14h 19m
Complete Guide to Cybersecurity: A Practical Approach
By: Omar Santos and Pearson
Course
-
Components of strategy4m
Components of strategy
From: Software Testing Foundations: Test Strategy
Video
-
Set your cyber strategy3m
Set your cyber strategy
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Requirements, plans, and strategy3m
Requirements, plans, and strategy
From: Software Testing Foundations: Integrating AI into the Quality Process
Video
-
Making the strategy last6m
Making the strategy last
From: Strategic Leadership for Cybersecurity Managers: From Team Management to Security Culture Development
Video
-
Carbon neutral strategy3m
Carbon neutral strategy
From: Tech and Sustainability: Building a Sustainability Action Report
Video
-
Cyber Crisis Management with NIST Cybersecurity Framework (CSF) 2.055m
Cyber Crisis Management with NIST Cybersecurity Framework (CSF) 2.0
By: Kip Boyle
Course
-
Defining cybersecurity: What it is and why it matters6m
Defining cybersecurity: What it is and why it matters
From: Foundations of Cybersecurity Operations
Video
-
Using a defense-in-depth strategy1m
Using a defense-in-depth strategy
From: Designing and Implementing Effective Cybersecurity Controls
Video
-
Defining modern cybersecurity governance4m
Defining modern cybersecurity governance
From: Security Governance and Compliance for Cybersecurity Managers: From Structure Design to Board Reporting
Video
-
The trade-off between strategy and tactics4m
The trade-off between strategy and tactics
From: Five Biggest Mistakes of Cybersecurity Programs
Video
-
Leveraging the NIST cybersecurity framework5m
Leveraging the NIST cybersecurity framework
From: Supply Chain Cybersecurity: Preventing Supply Chain Attacks
Video
-
Understanding cyber threat intelligence (CTI)10m
Understanding cyber threat intelligence (CTI)
From: Complete Guide to Cybersecurity: A Practical Approach
Video
-
What’s a SAR?3m
What’s a SAR?
From: Tech and Sustainability: Building a Sustainability Action Report
Video
-
Strategy, goals, objectives and risk management10m
Strategy, goals, objectives and risk management
From: ISACA Certified in Risk and Information Systems Control (CRISC) Cert Prep
Video
-
What are policies, standards, procedures, and guidelines?3m
What are policies, standards, procedures, and guidelines?
From: Writing Security Policies and Standards
Video
-
The Cybersecurity Threat Landscape1h 7m
The Cybersecurity Threat Landscape
By: Marc Menninger
Course
-
How do you expose holes in cybersecurity?3m
How do you expose holes in cybersecurity?
From: DJ Patil on Data Science: The Ask Me Anything Conversations
Video
-
Cybersecurity Audit and Assessment Fundamentals for GRC Analysts: From Vendor Risk to Incident Coordination1h 21m
Cybersecurity Audit and Assessment Fundamentals for GRC Analysts: From Vendor Risk to Incident Coordination
By: AJ Yawn
Course
-
Security governance, leadership, and risk strategies1h 9m
Security governance, leadership, and risk strategies
From: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep
Video
-
Cybersecurity Foundations: Security Architecture44m
Cybersecurity Foundations: Security Architecture
By: Pete Lindstrom
Course
-
Information Gathering - Web Edition: Cybersecurity Labs Powered by Hack The Box10h 14m
Information Gathering - Web Edition: Cybersecurity Labs Powered by Hack The Box
By: Hack The Box
Course
-
Communicating regulatory strategy to boards and stakeholders1m
Communicating regulatory strategy to boards and stakeholders
From: Navigating AI Regulations: A Business Guide to Risk, Responsibility, and Strategy
Video
-
Modern Threat Hunting Strategies to Identify Attacks2h 9m
Modern Threat Hunting Strategies to Identify Attacks
By: Paula Januszkiewicz
Course
-
Recommend an authorization strategy52s
Recommend an authorization strategy
From: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
Video
-
Plan a case management strategy2m
Plan a case management strategy
From: SIEM: Event Management with Splunk Security
Video
-
No greenwashing3m
No greenwashing
From: Tech and Sustainability: Building a Sustainability Action Report
Video
-
How to develop an AIOps implementation strategy2m
How to develop an AIOps implementation strategy
From: AIOps Foundations: Automating IT Operations using AI
Video
-
Which gases matter?4m
Which gases matter?
From: Tech and Sustainability: Building a Sustainability Action Report
Video
-
Recommend an authentication strategy1m
Recommend an authentication strategy
From: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
Video
-
Strategy on a page9m
Strategy on a page
From: Strategic Leadership for Cybersecurity Managers: From Team Management to Security Culture Development
Video
-
Creating a strategy to address the skills gap1m
Creating a strategy to address the skills gap
From: Addressing Technical Skills Gaps
Video
-
There are no hackers, there are only spies4m
There are no hackers, there are only spies
From: Spies, Lies, and Cybercrime: How Thinking Like a Spy Hunter Can Protect You from Cyberattacks
Video
-
Effective networking strategies3m
Effective networking strategies
From: Cybersecurity Careers: Build Your Brand in Cybersecurity
Video
-
How and where to build a portfolio2m
How and where to build a portfolio
From: Preparing to Get a Job in Data Analytics
Video
-
Doing a cost-benefit analysis1m
Doing a cost-benefit analysis
From: Addressing Technical Skills Gaps
Video
-
Cybersecurity in SCIS3m
Cybersecurity in SCIS
From: Supply Chain Beyond the Basics: Leveraging Supply Chain Information Systems
Video